{"vuid":"VU#257164","idnumber":"257164","name":"Microsoft DHCP Client service contains a buffer overflow","keywords":["Microsoft","DHCP Client service","buffer overflow","ms06-jul"],"overview":"Microsoft DHCP Client service contains a buffer overflow. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.","clean_desc":"Dynamic Host Configuration Protocol (DHCP) As described in RFC 2131, \"The Dynamic Host Configuration Protocol (DHCP) provides a framework for passing configuration information to hosts on a TCP/IP network.\" The Problem The Microsoft DHCP Client service contains a buffer overflow. If a remote attacker responds to a DHCP request with a specially crafted DHCP response, that attacker may be able to trigger the buffer overflow on the requesting system. For more information refer to Microsoft Security Bulletin  MS06-036.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code.","resolution":"Apply a patch from your vendor \nMicrosoft addresses this vulnerability with the updates listed in Microsoft Security Bulletin  MS06-036.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported in Microsoft Security Bulletin \nMS06-036\n. Microsoft credits \nMariano Nuñez Di Croce of \nCybsec Security Systems for providing information regarding this vulnerability.","author":"This document was written by Jeff Gennari.","public":["http://www.microsoft.com/technet/security/bulletin/ms06-036.mspx","http://www.faqs.org/rfcs/rfc2131.html"],"cveids":["CVE-2006-2372"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-07-11T18:39:51Z","publicdate":"2006-07-11T00:00:00Z","datefirstpublished":"2006-07-11T21:09:05Z","dateupdated":"2006-07-13T21:21:08Z","revision":11,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"10","cam_internetinfrastructure":"15","cam_population":"20","cam_impact":"20","cam_easeofexploitation":"13","cam_attackeraccessrequired":"20","cam_scorecurrent":"78","cam_scorecurrentwidelyknown":"87.75","cam_scorecurrentwidelyknownexploited":"107.25","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":78.0,"vulnote":null}